@exa I am not sure, if it can be configured automatically. I was thinking about manual lists. But it is just SQL table anyway, so importing any existing list into SQL table should be easy.
Botnets use each mail domain only few times, because co-hosted managed Mastodon instances probably somehow share the blocked mail domains and IP lists, which saves them lot of work.
But blocking is not enough. I wonder who is running the botnets. If we have databases of those weird .com domains, we can somehow figure out who pays for them. The IPs are probably IPs of compromised machines, so the owner of the IP can be contacted and honeypot installed.
The blocking is not enough... we need to analyze the situation. The common understanding is, that they are Russian propaganda botnets, but it is more than that. They are somehow AI powered, and they may be run by some actor, which is just willing to hire the botnet to anybody, who pays them (including Russian propaganda).
Instead of closing registrations, which means giving up future migrations from corporate networks, we need to somehow think about it. If they are trying to abuse us, it means, that they take us seriously. But who are they?